Skip to main content
Workforce LibreTexts

1.5: Chapter Review - Key Terms

  • Page ID
    32680
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    Key Terms

    Android operating system
    Google software operating system used to run non-iPhone mobile phones such as Samsung’s Galaxy
    artificial intelligence (AI)
    use of computers, robots, and machines to behave “intelligently,” engaging in autonomous decision making and behaviors
    augmented reality (AR)
    use of digital objects or elements in a real-life picture or scene
    automation
    use of computers or machines to do tasks that could be completed by a person
    binary digits
    sequences of the numbers 0 and 1 used in computer programming
    biometrics
    authentication that uses a person’s physical characteristics as a form of digital security
    cache
    type of storage in a computer that operates in the background, holding data that can be quickly retrieved
    central processing unit (CPU)
    unit that contains the microprocessor, or “brains” of a computer system
    client
    device that requests and uses resources from other devices on the network
    cloud
    servers housed in data centers to facilitate remote storage and computer operations
    cloud computing
    delivering computer resources such as programs and data storage through the internet rather than storing resources directly on a computer
    computer
    programmable machine that can execute predetermined lists of instructions and respond to new instructions
    computer security
    protection of computer systems and information that prevents unauthorized use
    cookies
    small data files that are deposited on user hard disks and internet sites visited
    cybercrime
    criminal offense that involves a computer and a network
    data erasure
    process by which information is not only deleted but overwritten as well
    data masking
    process by which personally identifiable information is removed from data, allowing a company to make decisions without violating customer privacy
    data resiliency
    ability to recover quickly from a data breach
    domain name system (DNS)
    phone book for the internet, enabling a user to send a message using their name, the symbol @, and the location of the computer as identified by its domain name
    e-commerce
    conducting business transactions online
    encryption
    process of taking information transmitted through the internet and converting it into an unrecognizable code to prevent unauthorized access
    ethernet
    protocols used to connect computers in a local area network or LAN
    external disk drive
    hard disk for information storage such as USBs, CDs, DVDs, and flash memory cards
    firewall
    barrier between a network that is secured and one that is not secured
    hackers
    individuals who gain unauthorized access to a computer system to steal someone’s information
    hard disk
    secondary storage areas where users can save files and retrieve data and programs
    hardware
    computer accessories such as keyboard, mouse, printer, and computer monitor
    HTTPS
    communication protocol that is more secure than HTTP
    hub
    device that sends and receives messages to and from all network connections
    hyperlink
    link on a page or document that, when clicked, navigates the user to that location; a connection between two web pages or documents
    hypertext transfer protocol (HTTP)
    rules that allow users to access information on the internet and protect confidential data such as credit card numbers
    information processing cycle
    sequence of events involved in processing information
    internal disk drive
    storage space within the computer that updates and produces copies of files
    Internet of Things (IoT)
    extension of internet connectivity beyond computers, enabling the transfer of information between machines and other objects, people, and animals by connecting them to the internet in some way
    internet protocol address (IP address)
    unique combination of characters used to identify the location of a host computer
    internet service provider (ISP)
    company that provides individuals or organizations with access to the internet
    intranet
    private network for internal company use; can be combined with cloud technology
    iPhone operating system (iOS)
    Apple’s software operating system, used to run iPhones, iPads, and other mobile devices
    machine learning
    use of software applications to make computations and decisions that can inform predictions without human intervention
    mainframe
    computer that is capable of great processing speed and data storage for large organizations
    malware
    software designed to damage the victim’s computer system once it gains access to it
    microchip
    small microprocessor unit used for programming and computer memory storage
    microcomputer
    personal computer that was much smaller than earlier computers and operated with microprocessors
    microprocessor
    consists of a control and an arithmetic-logic unit, which performs math and logical operations within a computer system
    minicomputer
    computer that is similar in power to a mainframe computer, but much smaller in size; used in mid-size organizations
    motherboard
    controls communications for an entire computer system
    nanotechnology
    technology that focuses on changing individual molecules to produce different properties or attributes
    network
    connection of two or more computer systems or devices, either by a cable or through a wireless connection
    operating system
    connection between a device’s hardware and its software
    packet switching
    technology that enabled the development of the internet; computer files are broken up into segments, which are transmitted over the network and reordered into a single file at their destination
    password management
    set of principles and best practices for storing and managing passwords to prevent unauthorized access to the computer
    personal computer (PC)
    microcomputer suitable for individual use
    phishing
    attempts to get users to interact with an email or website that appears to be legitimate but is fake
    random access memory (RAM)
    computer’s primary, short-term memory
    ransomware
    malicious software that encrypts computer data, rendering it useless and inaccessible, forcing the owner to exchange something of value to regain access
    read-only memory (ROM)
    memory not meant for storage but to process information as the computer is being used
    robotics
    use of robotic machines to perform tasks that no human could perform
    router
    device that directs data traffic and allows for multiple devices to run on a network
    secure sockets layer (SSL)
    security protocol that uses encryption to help ensure privacy of information and communications across the internet
    server
    connects devices and allows for resource sharing across networks
    short message service (SMS)
    technology for sending text messages through mobile phones
    smart space
    physical space that incorporates technologies that can be controlled through the internet
    social media
    digital technology that allows users (individuals and organizations) to share information about themselves such as posts, photos, and videos
    software
    computer program or set of programs with the end goal of converting data into processes or actions
    spoofing
    correspondence such as email that appears legitimate but instead is used to obtain your personal information
    supercomputer
    extremely powerful computer that has the fastest processors available
    transmission control protocol/internet protocol (TCP/IP)
    communication standard that allows data to be sent and received over a network, most notably the internet
    triangulation
    research technique whereby information is verified and validated through multiple sources
    virtual reality (VR)
    simulated environment in which users can interact as if they were physically present
    wearable
    device that uses computing technology to collect and receive data via the internet
    web browser
    a program used to find content stored on the WWW
    workstation
    powerful single-user computer, similar to a personal computer but with more powerful microprocessors

    This page titled 1.5: Chapter Review - Key Terms is shared under a CC BY 4.0 license and was authored, remixed, and/or curated by OpenStax via source content that was edited to the style and standards of the LibreTexts platform.